Skip to content
  Sunday 9 November 2025
Trending
April 2, 2024Chinese hackers use new ‘UNAPIMON’ malware for covert operations March 29, 2025Senior Cybersecurity Project Manager – Remote July 1, 2024Senior Engineer – Cybersecurity Operations and Engineering August 9, 2023MAR-10454006.r4.v2 SEASPY and WHIRLPOOL Backdoors March 27, 2025<h3>Vampire Cosplay Sparks Brand Resurgence: Ransomware Strikes in 2025</h3> October 30, 2023White House Implements Comprehensive Executive Order to Safeguard AI March 15, 2025SLED Cybersecurity Account Executive September 21, 2023VA CSOC Cybersecurity Analyst December 5, 2023Zebra ZTC Industrial ZT400 and ZTC Desktop GK420d January 23, 2025<h3>Trump Token Skyrockets in Cryptohack Roundup</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Russian Hackers Exploit 7-Zip Flaw to Break Through Windows Security
Industry News

Russian Hackers Exploit 7-Zip Flaw to Break Through Windows Security

SecuredyouadmSecuredyouadm—February 4, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Rapid Rise of Non-Human Identities Igniting Security Concerns

April 9, 2025

Urgent Alert: Deadly Cacti Vulnerability (CVE-2025-22604) Allows Hackers to Take Control Remotely

January 29, 2025

Binance Limits Access to 85 LockBit Crypto Wallets

February 23, 2024

UK Unleashes Cutting-Edge AI to Revolutionize Public Services

January 22, 2025



A recent security vulnerability in the 7-Zip archiver tool, CVE-2025-0411, was exploited in the wild to distribute the SmokeLoader malware. This flaw, which has a CVSS score of 7.0, allows remote attackers to execute arbitrary code in the context of the current user. It was addressed by 7-Zip in November 2024 with version 24.09.

According to Trend Micro security researcher Peter Girnus, Russian cybercrime groups actively exploited this vulnerability through spear-phishing campaigns using homoglyph attacks to spoof document extensions. It is suspected that this flaw was used in a cyber espionage campaign targeting governmental and non-governmental organizations in Ukraine amid the ongoing conflict with Russia.

The vulnerability bypasses mark-of-the-web (MotW) protections by double archiving contents using 7-Zip, allowing threat actors to craft archives containing malicious scripts or executables. The flaw was first detected in the wild on September 25, 2024, leading to the distribution of SmokeLoader, a loader malware often used to target Ukraine.

Phishing emails containing specially-crafted archive files were used in the attack, leveraging homoglyph attacks to disguise the inner ZIP archive as a Microsoft Word document file. The compromised email accounts associated with Ukrainian governing bodies and businesses added authenticity to the phishing messages, leading to the execution of internet shortcut files pointing to attacker-controlled servers.

To mitigate the risks associated with this vulnerability, users are advised to update their 7-Zip installations to the latest version, implement email filtering features, and disable the execution of files from untrusted sources. The campaign targeting Ukrainian organizations highlights the importance of cybersecurity measures, especially for smaller local government bodies that may be overlooked by threat actors.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Beware: 8 Game-Changing Cloud Security Trends Coming in 2025
North Korean Hackers Use Fake Job Interviews to Spread FERRET Malware on macOS
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures